• Title/Summary/Keyword: Key Distribution System

Search Result 667, Processing Time 0.033 seconds

System RBDO of truss structures considering interval distribution parameters

  • Zaeimi, Mohammad;Ghoddosian, Ali
    • Structural Engineering and Mechanics
    • /
    • v.70 no.1
    • /
    • pp.81-96
    • /
    • 2019
  • In this paper, a hybrid uncertain model is applied to system reliability based design optimization (RBDO) of trusses. All random variables are described by random distributions but some key distribution parameters of them which lack information are defined by variation intervals. For system RBDO of trusses, the first order reliability method, as well as monotonicity analysis and the branch and bound method, are utilized to determine the system failure probability; and Improved (${\mu}+{\lambda}$) constrained differential evolution (ICDE) is employed for the optimization process. System reliability assessment of several numerical examples and system RBDO of different truss structures are proposed to verify our results. Moreover, the effect of different classes of interval distribution parameters on the optimum weight of the structure and the reliability index are also investigated. The results indicate that the weight of the structure is increased by increasing the uncertainty level. Moreover, it is shown that for a certain random variable, the optimum weight is more increased by the translation interval parameters than the rotation ones.

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

Precoder Distribution and Adaptive Codebook in Wideband Precoding

  • Long, Hang;Kim, Kyeong Jin;Xiang, Wei;Wang, Jing;Liu, Yuanan;Wang, Wenbo
    • ETRI Journal
    • /
    • v.34 no.5
    • /
    • pp.655-665
    • /
    • 2012
  • Based on wideband precoding (WBP) in the multiple-input multiple-output orthogonal frequency division multiplexing system, an adaptive nonuniform codebook is presented in this paper. The relationship between the precoder distribution and spatial correlation is analyzed at first. A closed-form expression based on overlapped isosceles triangles is proposed as an approximation of the precoder distribution. Then, the adaptive codebook design is derived with the approximate distribution to minimize quantization errors. The capacity and bit error rate performance demonstrate that the adaptive codebook with WBP outperforms the conventional fixed uniform codebook.

Numerical Simulation of the Characteristics of Electrons in Bar-plate DC Negative Corona Discharge Based on a Plasma Chemical Model

  • Liu, Kang-Lin;Liao, Rui-Jin;Zhao, Xue-Tong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1804-1814
    • /
    • 2015
  • In order to explore the characteristics of electrons in DC negative corona discharge, an improved plasma chemical model is presented for the simulation of bar-plate DC corona discharge in dry air. The model is based on plasma hydrodynamics and chemical models in which 12 species are considered. In addition, the photoionization and secondary electron emission effect are also incorporated within the model as well. Based on this model, electron mean energy distribution (EMED), electron density distribution (EDD), generation and dissipation rates of electron at 6 typical time points during a pulse are discussed emphatically. The obtained results show that, the maximum of electron mean energy (EME) appears in field ionization layer which moves towards the anode as time progresses, and its value decreases gradually. Within a pulse process, the electron density (ED) in cathode sheath almost keeps 0, and the maximum of ED appears in the outer layer of the cathode sheath. Among all reactions, R1 and R2 are regarded as the main process of electron proliferation, and R22 plays a dominant role in the dissipation process of electron. The obtained results will provide valuable insights to the physical mechanism of negative corona discharge in air.

Numerical simulations of interactions between solitary waves and elastic seawalls on rubble mound breakwaters

  • Lou, Yun-Feng;Luo, Chuan;Jin, Xian-Long
    • Structural Engineering and Mechanics
    • /
    • v.53 no.3
    • /
    • pp.393-410
    • /
    • 2015
  • Two dimensional numerical models and physical models have been developed to study the highly nonlinear interactions between waves and breakwaters, but several of these models consider the effects of the structural dynamic responses and the shape of the breakwater axis on the wave pressures. In this study, a multi-material Arbitrary Lagrangian Eulerian (ALE) method is developed to simulate the nonlinear interactions between nonlinear waves and elastic seawalls on a coastal rubble mound breakwater, and is validated experimentally. In the experiment, a solitary wave is generated and used with a physical breakwater model. The wave impact is validated computationally using a breakwater - flume coupling model that replicates the physical model. The computational results, including those for the wave pressure and the water-on-deck, are in good agreement with the experimental results. A local breakwater model is used to discuss the effects of the structural dynamic response and different design parameters of the breakwater on wave loads, together with pressure distribution up the seawall. A large-scale breakwater model is used to numerically study the large-scale wave impact problem and the horizontal distribution of the wave pressures on the seawalls.

A Key Distribution and Authentication Scheme based on X.25 Protocol (X.25 프로토콜 기반의 새로운 키 분배 및 인증방식)

  • Sohn, Ki-Wook;Park, Eung-Ki;Lee, Jin-Seok;Shin, Ki-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3078-3087
    • /
    • 1997
  • The information security is very important in computer communication network, and the security system has been developed in many aspects to provide secure communication. The secret key distribution and mutual user authentication are essential element in designing security system, then many algorithms and implementation schemes have been proposed. But they don't consider communication protocol, so they are not easy to adapt a real communication network' In this paper, we propose a key distriburion and mutual user authentication scheme based on X.25 protocol which is the most popular in packet communication, and the proposed scheme maintains a protocol transparency and can select communication mode, so the security system is more capable.

  • PDF

Mode Switching Smooth Control of Transient Process of Grid-Connected 400 Hz Solid-State Power Supply System

  • Zhu, Jun-Jie;Nie, Zi-Ling;Zhang, Yin-Feng;Han, Yi
    • Journal of Power Electronics
    • /
    • v.16 no.6
    • /
    • pp.2327-2337
    • /
    • 2016
  • The mode-switching control of transient process is important to grid-connected 400 Hz solid-state power supply systems. Therefore, this paper analyzes the principle of on-grid and islanding operation of the system with or without local loads in the grid-connected process and provides a theoretical study of the effect of different switching sequences on the mode-switching transient process. The conclusion is that the mode switch (MS) must be turned on before the solid-state switch (STS) in the on-grid process and that STS must be turned off before the MS in the off-grid process. A strategy of mode-switching smooth control for transient process of the system is proposed, including its concrete steps. The strategy utilizes the average distribution of peak currents and the smooth adjustment of peak currents and phases to achieve a no-shock grid connection. The simulation and experimental results show that the theoretical analysis is correct and that the method is effective.

Effects of Upwelling/Downwelling on Suspended Particulate Matter Distributions over Shelf Mud Areas: Numerical Experiments

  • Gao, Shu;Jia, Jian-Jun
    • Journal of the korean society of oceanography
    • /
    • v.37 no.3
    • /
    • pp.178-186
    • /
    • 2002
  • The mud deposit located to the south of Cheju Island, the East China Sea, is characterized by an upwelling system or, on occasions, a combined upwelling-downwelling system. The water mass here is associated with relatively high suspended matter concentrations. In the present study, a vertical I-D model is used to undertake numerical experiments for evaluating the upwelling and downwelling effects on the suspended particulate matter distribution patterns within the water column. The results show that: (1) because the upwelling or downwelling velocity tends to be of the same order of magnitude as the settling velocity of suspended particles, a number of different patterns of suspended matter concentration distribution are possible, depending on the relative importance of the velocities; (2) the presence of upwelling can enhance the suspended particulate matter concentration; and (3) in an upwelling-downwelling system, maximum concentrations may or may not lie in the middle of the water column, depending on, once again, the interrelationships between the opwelling/downwelling velocities and the settling velocity. Hence, the physical processes associated with upwelling/downwelling appear to be relevant to the suspended material distribution over shelf mud areas.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.